Implementation + Security
Intuitive, secure and stress free system
OUR METHODOLOGY
MEASURE TWICE, CUT ONCE
We define a successful deployment by measuring the delta between our delivery and the expectations of our clients. Our target is firmly set to ensure the margin between the two is as narrow as possible.

Key Actions
- Document and understand current workflows and processes.
- Train and collaborate with “Super Users” in each module to ensure alignment of requirement / function.
- Conduct multiple training sessions before go-live.
- Import and validate data before go-live.
- Utilize a 100+ step project management template to ensure that tasks are completed in a timely and thorough manner.
With our goal in mind, we strive to perform as much of the installation, training, and leg work in advance of being on property. This approach allows us to focus on users and system comprehension while on-site.
DEPLOYMENT TYPE
CLOUD BASED DEPLOYMENT / BEHIND THE FIREWALL
We support both Behind the Firewall and Cloud Based deployments. We work closely with our clients to select the deployment type that meets all of their security, regulatory, and operational needs.

Cloud Based Deployment
- Hosted in secure ITIL and ISO 27001 compliant data center.
- Up to date Anti-Virus, Intrusion Detection, and Intrusion Prevention systems.
- Geographically dispersed data centers with 15 minute replication and point in time restore function, up to 35 days.
- Supports encryption at REST and HTTPS.
- Access restriction based on IP.
- ADFS integration
Behind the Firewall Deployment
- Deploy SlotTrak on your own hardware.
- Minimal hardware required.
- ADFS integration